Resubmissions

30-07-2021 12:31

210730-tr61sakqpe 10

30-07-2021 12:28

210730-6jgqmjgpse 10

General

  • Target

    79624_Video_Oynatıcı.apk

  • Size

    2.6MB

  • Sample

    210730-6jgqmjgpse

  • MD5

    44c91f91f4c8904e7b21076d2d95fc42

  • SHA1

    1f23ebc8c338f0ac6a42105c4dedd04b157e26f4

  • SHA256

    f9a4dd42e1694b390c2c6e02b25c7cbf57947ab28aeea1f67ed54bc09de422d7

  • SHA512

    347429dfef6a5dc1cac9454f65025c46124610910895337a68271c236ce7c105eb5773572ba01d4c80b2e1809089f249191980b07ffed15b4d2745647a202926

Malware Config

Targets

    • Target

      79624_Video_Oynatıcı.apk

    • Size

      2.6MB

    • MD5

      44c91f91f4c8904e7b21076d2d95fc42

    • SHA1

      1f23ebc8c338f0ac6a42105c4dedd04b157e26f4

    • SHA256

      f9a4dd42e1694b390c2c6e02b25c7cbf57947ab28aeea1f67ed54bc09de422d7

    • SHA512

      347429dfef6a5dc1cac9454f65025c46124610910895337a68271c236ce7c105eb5773572ba01d4c80b2e1809089f249191980b07ffed15b4d2745647a202926

    • Hydra

      Android banker and info stealer.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks